intuisec: a framework for intuitive user interaction with ... - CiteSeerX
Recommend Documents
outside the robot's field of view, the robot maintains a probabilistic belief about the people ..... High resolution maps from wide angle sonar, Proceedings of.
Now at MR-Research Center and Institute of Psychology, University of Aarhus, ... the interface as scenes, objects and actors can call upon instinctive ... In mechanical devices the functions and their control structure is objectified in the material.
In 2008, Raol Vertagaal and Ivan Poupyrev [1] defined OUI as interfaces that have .... several organic devices allowing hand-free control cannot be applied under ..... there is two-handed gestures as well, such as clapping, ribbing, approaching ...
Timeline at http://www/isoc/guest/zakon/Internet/History/HIT.html). In such .... the browser, including navigating to different pages and scrolling within pages ...
Sep 8, 2003 - for virtual balloon objects and flashlights are used as pointing devices for manipulating them. Just as concrete examples of tangible user ...
the environment and to help users while interacting with the Intelligent Environ- ment. ... Environment, several software/hardware components were combined (see Figure. 1). ... There is an instrumented desk, i.e. an ordinary table on which .... To te
with Macromedia Flash MX3. These two components are connected via an XML-. Socket-Connection. The CE-server controls the Flash animation by sending ...
Intuitive Human-Machine-Interaction and. Implementation on a Household Robot Companion1,2. Christopher Parlitz, Winfried Baum,. Ulrich Reiser, Martin ...
interface's key functions is gained with minimal cognitive pro- cessing power and is .... number keys, delete and scroll down, scroll up, call and hang up. 3.2.2.
Jul 11, 2018 - User Modeling; Personalisation; News Reading Behaviour; ... and that copies bear this notice and the full citation on the first ... of adaptivity ('automatic adaptation') in user interfaces has .... are adaptive presentation and naviga
To test this approach, we generated a proof-of-concept version based on off-the shelf ... implemented them in a Python-based unifying framework that streamlines the application ... method to ensure faster convergence to a good set of clusters.
(iii) multi-player online games leveraging social networking ... social networking platforms. .... sources most effectively, a scheduler will continuously up- date the ...
Oct 31, 2008 - TechnologiesâChallenges and Future Topics. Ansgar Scherp .... approach to tackle the challenges and problems. 2. ... precise answers to their queries, to exhibit a deterministic behavior ... mother and child [7, 4]. ..... [2] P. Brus
who cannot spell, whereas a dynamic interface may prove too much .... in the dictionary that start with those letters as possible completions. A simple ..... board Corpus, which consists of approximately 2.6 million words.3 Thus the prob-.
of a simple home messaging appliance, which combines a ... developing information appliances for the home. ... developers of VIP, for their technical support.
proposed to be the preferred knowledge level for designing intuitive interaction. Using. Johnson's .... within the same
within the same domain of expertise (e.g. graphic design) there may be differing knowledge on the tool level ... Adobe Photoshop). The continuum of knowledge ...
handicapped people - A One Click Approach. Claire Dune1,2, Christophe Leroux2, Eric Marchand1. AbstractâAssistance to disabled people is still a domain in.
Figure 5: Graphical representation of the internal model of the triangle agent. ... Figure 7: Similarity of the rectangle and pick-and-place trajectories. .... The key to its success is finding intuitive features for tugging the existing trajectory i
design of technical systems, application and non-conscious use of previous knowledge, intuition .... graphic design) there may be differing knowledge on the tool level of the continuum, depending on the ... Adobe Photoshop). The continuum of ...
with keys on the phone. Results show that ... the small, non-ergonomic keys for control in applications ..... rectional keys to scroll the maps along the four cardinal.
They can perceive persons in their environment, rec- ... One impressive piece of engineering is the robot Rollin' ..... ner, H. Hirschmüller, S. Kielhofer, R. Koni-.
that allows us to prove the system properties and validates the specification. ... interactive system based on a direct manipulation style is characterised by a user- .... The values can be integers, characters, booleans, enumerate sets, etc. ... set
intuisec: a framework for intuitive user interaction with ... - CiteSeerX
Trust Builder that leverages inherently secure âtouchâ based on LLCs to ... Trust Builder. Passlet Manager. UPnP Control. Point App. MIDDLEWARE. LAYER.
The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’07)
INTUISEC: A FRAMEWORK FOR INTUITIVE USER INTERACTION WITH SMART HOME SECURITY USING MOBILE DEVICES Dimitris N. Kalofonos Pervasive Computing Group Nokia Research Center Cambridge Cambridge, MA 02142 [email protected] A BSTRACT This paper presents IntuiSec, a framework for intuitive user interaction with smart home security using mobile devices. The design approach of IntuiSec is to introduce a level of indirection between the user-level intent and the system-level security infrastructure. This layer of indirection, implemented by a collection of distributed middleware and user-level tools, exposes only concepts and real-world metaphors that are intuitive to non-expert users and translates their intent to the necessary underlying security settings. The IntuiSec framework presents the user with intuitive steps for setting up a secure home network, establishing trusted relationships between devices, and granting temporal, selective access for both home occupants and visitors to devices within the smart home. I.
I NTRODUCTION
As smart homes become part of our daily life [1], [2], so do the network security threats. One of the main challenges in home network security is that its users are non-expert consumers, who have no background nor interest in understanding the relevant technologies. This leads to a growing problem whereby, no matter how sophisticated are the underlying security protocols, home networks remain vulnerable because users either misconfigure or even do not use the security infrastructure at all. Recently, attempts have been made to improve the usability of security. However, many such proposals involve improving the user interface to better present the security concepts to the end-user, while still forcing him to interact directly with low-level security parameters, such as crypto keys and access control lists (ACL). We believe these attempts are inadequate as they still directly expose non-expert users to the complicated underlying security. In this paper, we present our proposal to address this issue called IntuiSec (Intuitive Security). IntuiSec places mobile phones in the center of user interaction with smart home security, because they are ubiquitous and personal, they are reminiscent of ‘remote controls’, and they feature a multitude of connectivity options, some of which resemble “touch”, a very intuitive user interaction modality. Rather than making direct interaction with security easier, IntuiSec introduces a level of indirection between the user-level intent and existing smart home security infrastructure, which exposes only concepts that are intuitive to non-expert users and translates their intent to the necessary security settings. IntuiSec is a comprehensive framework that guides users to setup secure smart homes and c 1-4244-1144-0/07/$25.00 2007 IEEE
Saad Shakhshir Computer Science and AI Lab (CSAIL) Massachusetts Institute of Technology Cambridge, MA 02142 [email protected] manage trust and access to their devices. IntuiSec does not intend to design new security mechanisms or protect a household against the most advanced adversary; instead, it aims at improving real-world security by making it easy for non-experts to take reasonable measures and use what already exists. The rest of this paper is organized as follows: Section II. presents an overview of related work; Section III. describes a usage scenario that motivated our work; Section IV. gives details about the system design of IntuiSec; Section V. presents our example implementation of the framework; finally, Section VI. gives our conclusions. II.
R ELATED W ORK
Smart home security involves research from the fields of Human Computer Interaction with Security (HCI-SEC) and smart space security. HCI-SEC research examines the security usability of applications and technologies [3] and provides general design guidelines [4]. Most of the research in this field focuses on how to better present the security concepts to the end-user. Security in smart spaces has also attracted intense research interest (e.g. [5], [6]), although the focus is not necessarily on usability. IntuiSec is most related to research on smart space security usability. In this area, the issue of 802.11 security usability has attracted a lot of interest both in the industry (e.g. [7], Wi-Fi Alliance EZ-Setup WG) and in the academia (e.g. [8]). One approach is to leverage Location Limited Channels (LLC’s) to setup security associations [9], [10]. Holmstr¨om in [11] uses the metaphor of a business card to delegate permissions between individuals. In the area of smart home security [12], the Universal Plug and Play (UPnP) Forum [13] has created specifications, although the framework’s usability was out-of-scope. IntuiSec takes a step further compared to the work above, by offering a comprehensive framework that guides non-expert users from easily setting up their secure smart homes, to intuitively managing trust and access to their devices and services. III.
M OTIVATING U SAGE S CENARIO
Bob and Alex are roommates. They want any new devices they buy to gain permanent and secure connectivity to their smart home. At the same time they want to protect their home from being accessed by non-authorized users. Once their devices are connected and can all communicate with each other securely, Bob would like to prevent Alex from accessing services provided by his devices until he explicitly grants him access. He could also opt to have his devices grant some default level of
The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’07)
access to everybody. By way of example, Bob purchases his own media server and they both jointly purchase an A/V renderer for the living room, so they both have access to it by default. Bob can now stream content from his media server and display it on the A/V renderer, however Alex cannot. Still, Alex would like to play some music from Bob’s server, so he asks Bob to give him access. He agrees, but he only wants to give Alex permission to stream music and not movies. One day, their smart fridge breaks down. The repairman comes in, but by default he is not even able to connect to their network. Alex grants the repairman access for one day to selected functionality of the fridge, so that he can connect and repair it. At the end of the day, the repairman automatically loses all access both to the fridge and their network.
H ello S AA D ! Y ou are m y firs t owner. P leas e Ins ert the P hyK ey
G reat! Now pleas e T AP m e with a hom e Mobile D evice
2 1
IV. A.
S YSTEM D ESIGN
Basic Design Concepts
IntuiSec assumes that every home device has a Location Limited Channel (LLC), e.g. Near Field Communication (NFC), RFID, Infrared. We believe this is a realistic assumption given industry momentum, decreasing costs, and proliferation of these technologies. It also assumes that communications over LLCs are inherently authentic and difficult to eavesdrop due to their very short range of a few centimeters. Finally, IntuiSec assumes there is strong platform security that protects data in the devices, and that hardware and software shipping with the devices is trustworthy. IntuiSec defines Home Devices as devices which have knowledge of a common Home Secret. This secret is given to a Home Device when the user ‘unlocks’ the home network for it, a proceedure we call Easy Setup and is described in Section B.. This may be performed using a physical object reminiscent of a key called PhyKey or other means such as manual input. Home Devices have permanent connectivity access to the home network and they alone can be used to allow Visitor Devices to access it and any of its services. Home Devices are further distinguished into: (a) Infrastructure Devices (e.g. access points); (b) Mobile Devices (e.g. mobile phones) that can be used to touch all types of Home Devices; and (c) Fixed Devices (e.g. printers) that cannot be easily moved to touch other non-Mobile Devices. The term TAP describes using a Mobile Device to touch another device. During a TAP, the system through the LLC performs security-related transactions, e.g. exchanges public keys, authenticates Home Devices, transfers link keys, etc. IntuiSec distinguishes different user roles. The first user of a new device becomes its first Owner. Owners have full access to a device and only they can grant permission to others to access it and add others to its Owner list. Users interact with service provider devices in the home through devices that act on their behalf. Therefore, it is users and not devices that are the subjects of all actions in the IntuiSec smart home. This enables access privileges to persist regardless of which device a user is using. Users can be either Home Occupants (i.e. owners of at least one Home Device) or Visitors (i.e. owners of only Visitor Devices).
3
T AP
4
C ongratulations S A A D ! Y our device is now hom e network ready
Figure 1: Easy Setup of a 802.11 printer. The HomeID (HomeID = hash(Home Secret))1 is used to uniquely identify the smart home. Each user is assigned a system-wide keypair {U KP RI , U KP U B } during the Easy Setup process described in Section B., e.g. using a username/password pair or biometric information. The UserID (U serID = hash(U KP U B )) is used to uniquely identify each user. The UserID of the Owner is called OwnerID. Each service provider device has a unique private/public keypair {P KP RI , P KP U B } that is pre-shipped with it. The ProviderID (P roviderID = hash(P KP U B )) is used to uniquely identify service provider devices. B. Easy Setup IntuiSec aims at providing a “buy-plug-and-play” user experience. When a user purchases a new device, IntuiSec guides her to perform the three simple steps described below and depicted in Figure 1 (for a new Fixed Device). • Step 1: the user performs the imprinting process, by which the new device comes to learn about its first Owner [14]. Figure 1 shows a username/password entry system, however this is not a requirement. • Step 2: the user transfers the Home Secret to the device. This can be done with the insertion of the PhyKey, as shown in Figure 1, however this is not a requirement. A PhyKey provides an intuitive analogy to door keys: the PhyKey ‘unlocks’ the home network just like the house key unlocks the front door. • Step 3: if the device being set up is an Infrastructure Device then this step is not necessary. For a Mobile Device, 1 It is also possible to assume a shared home keypair {H P RI , HP U B } and define HomeID = hash(HP U B ).
The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’07)
IntuiSec
IntuiSec
IntuiSec
Manufacturer mechanism to set the user-level “Bluetooth PIN”
Manufacturer mechanism to set the user-level “passkey”
Manufacturer mechanism to set the user-level “WEP key”
Bluetooth security framework generates session link-level keys used for authentication and encryption
WPA security framework generates and continuously changes link-level keys used for authentication and encryption
WEP security framework uses the WEP key entered by the user for authentication and encryption
Info destined for the Passlet recipient device. Removed before sending the Passlet to the target Provider.
Issues: • does not prevent user receiving passlet to give out secrets to other users. Those users would then gain limited connectivity access, but not access to the target device • requires passlet exchange using inherently secure channels (e.g. TAPing))